Author: Reuben Ralte

This new frequency band of 1,200MHz in 6GHz is divided into different bands, something similar to what happens with the 5GHz band where we have different bands within a larger frequency band. These frequency bands in 6GHz are the following: UNII-5: 5925-6425MHz (500MHz) UNII-6: 6425-6525MHz (100MHz) UNII-7: 6525-6875MHz (350MHz) UNII-8: 6875-7125MHz (250MHz) As you can see, the largest frequency band is UNII-5, followed by UNII-7, and then UNII-8 and UNII-6. Thanks to these frequency bands, we are going to have different channels available with different channel widths, specifically we can have: Up to 59 new channels with 20MHz channel width.…

Read More

What is Asuswrt ROG? Asuswrt ROG is the firmware from the manufacturer ASUS that is installed only on the routers of the ASUS ROG Rapture range, that is, the top-of-the-range gaming routers from the manufacturer ASUS. Although this manufacturer has other gaming-oriented routers, those with the «ROG» label are the top of the range, with the best hardware to provide the best possible performance, and with Asuswrt ROG firmware that incorporates all the available technologies to provide the best possible gaming experience. The main features of this firmware for ASUS routers are that it incorporates a large number of advanced…

Read More

When we start surfing the Internet it seems like a very simple task. However, it is a more complex task than it seems. That all the tasks are carried out normally and without problems depends, without a doubt, on our router. The process begins when our router assigns us a private IP or we establish it manually. If an error occurs in the assignment of a private IP, we will have problems. Either because it does not correspond to the network range of our router or they are duplicated, if either of the two occurs, a failure will occur. Normally…

Read More

google drive It is without a doubt one of the most popular platforms for storing files in the cloud. However, we can always have problems if we run into a hacker who wants to steal our information. For this reason, in this article we want to give some essential tips for protect our files in Drive and prevent them from accessing our account. How to protect Drive and files It is essential to upload files to the cloud with total security. We must not host content that could be exposed for anyone to steal. It is especially important if we…

Read More

When we browse the Internet we can come across many types of threats. There are varieties of malware responsible for stealing information, encrypting files, spying on us… They can even delete everything on our computer and lose all the data. In this article we are going to focus on how a wiper, a threat that can be even worse than ransomware. We will also give tips to avoid being a victim. How does a wiper work? A wiper is considered by many to be the worst possible malware. It is true that a ransomware can be just as tragic, since…

Read More

Why the use of VPN has grown We can think of using a VPN to improve privacy and security. But it’s not always like this. They are tools that offer a wide range of options and each user may want to install this type of program for a different reason. You just have to see the data offered by Atlas VPN to see this explosion: it has gone from 277 million VPN downloads in 2020 to 785 million last year. If we think of Spain and neighboring countries, the increased use of VPNs It has a direct relationship with the…

Read More

Wi-Fi specifications This new high-performance WiFi Mesh system incorporates Simultaneous tri-band with Wi-Fi 6 and AX11000 classIn addition, we will have the possibility of connecting Wi-Fi wireless clients to the 5GHz-2 frequency band that is used for interconnection, or letting us only have traffic from the backbone network, in order to have better wireless and wired performance. In a global form. Although ASUS allows us both options (separating the frequency bands in SSID), our recommendation is to leave the interconnection band free and not connect to any WiFi client to maximize performance. In the 2.4GHz band we can achieve a…

Read More

Internet users when we browse the Internet must be attentive to the files we download and the links we click. Cybercriminals will try to attack our computers by infecting them with various types of malware, viruses, Trojans, worms, and more. Currently, the favorite attacks to take advantage of are phishing and ransomware. Generally, to carry out this type of attack requires quite a bit of technical knowledge, although this is not always the case. In this article, we are going to see how phishing kits make it easy for non-professional users to spoof identities. Phishing attacks a major threat Most…

Read More

When we create an email, social network or other account, we obtain access credentials. The password must be strong with uppercase, lowercase and special symbols, and must not be reused. Then, together with the username, comes the moment when we have to decide where we are going to store them so that we can retrieve them when we need them. Depending on the way we decide to store those credentials, it will be more or less secure. In this article we are going to see how many still use paper and pencil instead of a password manager. The Bitwarden survey…

Read More